Professional Documents
Culture Documents
Kelas : 17.2J.07
NIM : 17191056
c.Malicious Software
2. A software that can replicate by injecting or infecting its own code into other file :
a.Virus
c.Worm
4. Example of Worm :
d. I Love U.txt
b. Trojan
ESSAI
which is created to do something bad and to perform criminal intension. This kind of software is
called malicious software or malware.
Virus is a software that can replicate by injecting or infecting its own code into other file.
3. According to infect to other file, virus can be divided into three categories, mentioned that
and explain ?
1. Overwriting A type of computer virus that will copy its own code over the host computer
system's file data, which destroys the original program. After your computer system has been
cleaned using an antivirus program, users will need to install the original program again.
2. Appending A virus that inserts a copy of its malicious code at the end of the file. The goal of
an appending virus is not to harm the host program, but to modify it to hold the virus code and
then be able to run itself.
3.Prepending A virus defines the method it uses of infecting files by adding their code to the
beginning of the file. By doing this, these viruses ensure that they are activated when an
infected file is used.
Worm is also a kind of malicious software. It is different from virus which is worm can not inject
of infect other files. A worm is a software which replicates by creating its own copy. And
without infecting other file. Worm actually spreads through a network or the Internet using
email. Below is a sample of worm called I Love You. Worm I Love You spreads through the
Internet as an email attachment.
Trojan horse is derived from ancient Greek. Trojan Horse is a program that looks like a good
program but actually contains destructive code or destructive feature. Trojan horse is different
from virus and worm, trojan horse can not replicate and cannot infect other file.
There are many kind of trojan horse. Below are some of them:
a. Password stealer
b. Keylogger
c. Fake Program
d. Anonymous emailer
e. Remote monitoring
f. Remote administrator, etc
6. How to clean Virus, Malware, Worm, and Trojan Horse ! ( with your own words)
1. Understand the difference between computer worms and ordinary computer viruses.
2. Don't open emails from unknown addresses, open suspicious files even if the file is from a
friend.
3. Install a firewall and antivirus program.
4. Disable System Restore if you suspect that the computer has been infected by a computer
worm.
5. Scan the computer using antivirus software
If you only use Windows Defender for your antivirus, run a full scan using it.
1. Select the Start menu, type Windows Security, and select the Windows Security app.
2. Select Virus & threat protection from the left navigation pane. Under Current threats,
select Scan options.
3. Select Full scan, and then select the Scan now button.